-
461
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01“…网络与信息安全学报…”
Get full text
Article -
462
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
463
DNNobfus: a study on obfuscation-based edge-side model protection framework
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
464
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
465
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
466
-
467
Android complex information flow analysis method based on communicating sequential process
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
468
Anti-obfuscation Android application similarity detection method based on API call
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
469
Adaptive IP geolocation framework for target network scenarios
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
470
-
471
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
472
Survey of digital signature technology based on error correcting codes
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
473
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
474
Research progress in code reuse attacking and defending
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
475
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
476
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
477
Hybrid-chain-based supervision scheme for privacypreserving trading system
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
478
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
479
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
480
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article